In this paper we investigate cluster collective behaviors aroused by epidemic spread in a patchy population via feedback pinning control strategy. We construct a class of complex network system combined with states feedback behavior synchronization network systems and epidemic spread constant population systems with patch dispersal. In which the dispersal effect among patches are included in the susceptible systems, as well as considering the contact willing function for each patch, determined by the disease's information and individuals' behaviors, as the added cofactor before bilinear incidence. On the one hand, we derive conditions about the global asymptotical stability of disease-free equilibrium, and the existence of positive equilibrium. On the other hand, we design states feedback controllers related with the patch disease information to achieve cluster behaviors synchronization. By using the Lyapunov stability analysis method, the global asymptotical stability of the positive equilibrium is discussed, and meanwhile, the criteria for cluster collective behaviors are obtained. Numerical simulations are performed to support our theoretical results.Manual microscopic analysis is the gold standard for analyzing blood smear. Microscopic analysis of blood smear by a hematologist is subjected to many challenges such as inter-observer variations, operator experience, and conditions of observation. This study aims to examine several parameters extracting from the features of blood smear images. These parameters were used to develop a predictive function, which can be used to automate the microscopic analysis of blood cells instead of manual observation. Fractal dimension, roundness, and aspect ratio were estimated for two types of abnormal erythrocytes echinocyte and sickle cell. Standard conditions and the choosing of the optimum parameters through the imaging preprocessing were done in order to ensure that the chosen parameters reflect the morphological characteristics of examined erythrocytes. Statistical discriminant analysis was used to build the predictive function for erythrocytes morphological change by a linear combination of the measured parameters.n the enhancement of a fully automated microscopic system for blood smear analysis.In this paper, we propose and analyze a delayed diffusive viral dynamic model incorporating cell-mediated immunity and both cell-free and cell-to-cell transmission. After discussing the well-posedness, we provide some preliminary results on solutions. Then we study the existence and uniqueness of homogeneous steady states, which turned out to be completely determined by the basic reproduction number of infection R0 and the basic reproduction number of immunity R1. Note that when R1 is defined, it is necessary that R0 &gt; 1. https://www.selleckchem.com/products/mtx-531.html The main result is a threefold dynamics. Roughly speaking, when R0 1 the infected-immune steady state is globally asymptotically stable. The approaches are linearization technique and the Lyapunov functional method. The theoretical results are also illustrated with numerical simulations.The black soil of Northeast China is sticky and agglomerates easily, which often adheres to the surface of a traditional furrow opener during the furrowing process. In this paper, biomimetic design principles in resistance-reducing, anti-adhesion and resistance-reducing mechanism of biomimetic disc furrow opener were studied. Nine kinds of singular convex hull, nine kinds of singular wedge and nine kinds of mixed convex hull and wedge structural biomimetic disc furrow opener were designed, and the furrowing process with the soil simulated by finite element method (FEM).Three types of biomimetic disc furrow opener with less resistance were manufactured by laser processing for comparative test in soil bin based on the simulation results. The test results showed that the resistance of the biomimetic disc furrow opener was less than that of the ordinary disc. The soil-disc stress, influence of biomimetic structures, moisture content and furrow speeds on resistance were discussed. The resistance-reducing rate of D-BC-3 reached the maximum value 15.36% at the furrow speed of 0.6 m/s and the soil moisture content of 20%. It is believed that the biomimetic design principles can provide the significant inspirations for the future design of disc furrow opener with drag reduction.Topology optimization (TO) is a powerful technique capable of finding the optimal layout of material and connectivity within a design domain. However, designs obtained by TO are usually geometrically complex. Such complex designs cannot be fabricated easily by conventional manufacturing methods. Therefore, additive manufacturing (AM), a free-form manufacturing technique, is extensively coupled with TO. Like most techniques, AM has its own limitations. Consequently, a range of additive manufacturing oriented topology optimization (AM oriented TO) algorithms were proposed to generate the topologies suitable for AM. Due to existing trade-off relationships in AM oriented TO, investigating multi-objective AM oriented TO seems essential to obtain more practical solutions. This paper provides a review on the recent developments of MOTO, AM oriented TO, and trade-off relationships that exist in AM oriented TO. This review paper also discusses the challenges and future trends in these topics. It is hoped that this review paper could inspire both academics and engineers to make a contribution towards bridging together MOTO and AM.With XML becoming a promising standard for data storage, describing, transferring and exchanging information on the Internet, data security and privacy protection of XML become the focus of research in recent years. In order to achieve the authorization of legitimate user and ensure the secure access to sensitive information, in this paper, in the context of cloud storage, with the purpose of sharing sensitive XML information, a polynomial authorization scheme with Kerberos authentication was proposed, which was based on the users' access purpose and privacy policy. In this scheme, first, Kerberos authentication was used to identify the user, and then the polynomial whose coefficients were from the leaf node address was used to complete the authorization of user. For the legitimate user, under the interaction of authorization polynomials and the global structure view, authorization matrix is generated dynamically, its temporary and dynamic characteristics greatly improves the security of the system. Finally, with the help of authorization matrix and auxiliary information tables, security queries were successfully completed.